Adoptable Cookbooks List

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

A collection of recipes to help deploy and manage the Deep Security agent.

Requirements

All of the recipes in this cookbook require a working Deep Security infrastructure. The key component is the Deep Security manager. The agents (which these recipes help you manage) do the heavy lifting but the manager gives the marching orders.

There are no specific technical requirements beyond a standard Chef deployment.

<a name="attributes"></a>

Attributes

deep-security-agent::deploy-dsa

<table>
<tr>
<th>Key</th>
<th>Type</th>
<th>Description</th>
<th>Default</th>
</tr>
<tr>
<td><tt>['dsm_agent_download_hostname']</tt></td>
<td>String</td>
<td>Hostname of the Deep Security manager</td>
<td><tt>app.deepsecurity.trendmicro.com</tt></td>
</tr>
<tr>
<td><tt>['dsm_agent_download_port']</tt></td>
<td>Int</td>
<td>The port to connect to the Deep Security manager on to download the agents. This is typically the same port as the admin web access</td>
<td><tt>443</tt></td>
</tr>
<tr>
<td><tt>['ignore_ssl_validation']</tt></td>
<td>Boolean</td>
<td>Whether or not to ignore the SSL certificate validation for agent downloads. Marketplace AMI and software deployments ship with self-signed certificates and require this set to 'true'</td>
<td><tt>false</tt></td>
</tr>
<tr>
<td><tt>['dsm_agent_activation_hostname']</tt></td>
<td>String</td>
<td>The hostname for the agents to communicate with once deployed. For Marketplace AMI and software deployments this is typically the same hostname as 'dsm_agent_download_hostname'</td>
<td><tt>agents.deepsecurity.trendmicro.com</tt></td>
</tr>
<tr>
<td><tt>['dsm_agent_activation_port']</tt></td>
<td>Int</td>
<td>The post to use for the agent heartbeat (the regular communication). For Marketplace AMI and software deployments, the default is 4118</td>
<td><tt>443</tt></td>
</tr>
<tr>
<td><tt>['tenant_id']</tt></td>
<td>String</td>
<td>In a multi-tenant installation (like Deep Security as a Service), this identifies the tenant account to register the agent with</td>
<td><tt>nil</tt></td>
</tr>
<tr>
<td><tt>['tenant_password']</tt></td>
<td>String</td>
<td>In a multi-tenant installation (like Deep Security as a Service), this identifies the tenant account to register the agent with</td>
<td><tt>nil</tt></td>
</tr>
<tr>
<td><tt>['policy_id']</tt></td>
<td>String</td>
<td>The Deep Security ID assigned to the policy to apply to the agents on activation</td>
<td><tt>nil</tt></td>
</tr>
<tr>
<td><tt>['policy_name']</tt></td>
<td>String</td>
<td>The name you assigned to the policy to apply to the agents on activation</td>
<td><tt>nil</tt></td>
</tr>
</table>

Usage

deep-security-agent::default

Make sure that you include 'deep-security-agent' in your node's 'run_list'. This will ensure that the Deep Security agent is installed (it's the default.rb recipe).

{
"name":"my_node",
"run_list": [
"recipe[deep-security-agent]"
]
}

Dependent cookbooks

This cookbook has no specified dependencies.

Contingent cookbooks

There are no cookbooks that are contingent upon this one.

CHANGELOG

Created automatically for commit e7925c0d8c3bebe539ef77e182ca17d615d81686

Collaborator Number Metric

0.2.0 failed this metric

Failure: Cookbook has 0 collaborators. A cookbook must have at least 2 collaborators to pass this metric.

Foodcritic Metric

0.2.0 failed this metric

FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:78FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:80FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:83FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:86FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:89FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:100FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-check-in-with-manager.rb:15FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-create-diagnostic-package.rb:15FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-create-integrity-baseline.rb:15FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-recommend-security-policy.rb:15FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-scan-for-integrity-changes.rb:15FC001: Use strings in preference to symbols to access node attributes: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-scan-for-malware.rb:15FC002: Avoid string interpolation where not required: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:119FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:78FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:80FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:83FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:86FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:89FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/default.rb:100FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-check-in-with-manager.rb:15FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-create-diagnostic-package.rb:15FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-create-integrity-baseline.rb:15FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-recommend-security-policy.rb:15FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-scan-for-integrity-changes.rb:15FC019: Access node attributes in a consistent manner: /tmp/27203b7b748eebcafff7304f/deep-security-agent/recipes/dsa-scan-for-malware.rb:15FC064: Ensure issues_url is set in metadata: /tmp/27203b7b748eebcafff7304f/deep-security-agent/metadata.rb:1FC065: Ensure source_url is set in metadata: /tmp/27203b7b748eebcafff7304f/deep-security-agent/metadata.rb:1